Showing 8 of 48 Blog Posts
IPv4 addresses Consist of 32 bits. Are broken into four octets (8 bits each). Use dotted-decimal format; an example is 172.16.122.204. Minimum value (per octet) is 0,...
Three classes of attack are commonly found in today’s network environment: Access attacks Reconnaissance attacks Denial of service (DoS) attacks Access Attacks An access attack is just...
Internet Control Messaging Protocol (ICMP) is used by ping and traceroute utilities. Packet Internet Groper (ping) allows you to validate that an IP address exists and can...
WAN Interfaces WAN interfaces are used to provide a point of interconnection between Cisco routers and other network devices. Types of WAN interfaces include Basic Rate Interface...
A MAC address is hard-coded (burned in) on the network interface controller (NIC) of the Physical layer device attached to the network. Each MAC address must be...
Bandwidth The total amount of information that can traverse a communications medium measured in millions of bits per second. Bandwidth is helpful for network per¬formance analysis. Also,...
TCP trace is a utility by which you can trace a destination for a specific TCP port. It is a built in utility in Linux but for...